These courses help attendees gain experience in determining whether a piece of code is malicious and how it can impact an infrastructure. Focusing on both static and dynamic techniques; trainees will expand their knowledge by using, sandboxing, binary analysis, code de-obfuscation, and low -level programming.

Are you in the trenches, working with the nuts and bolts of an infrastructure? These courses are meant to give you an understanding of what’s happing across the wire from layers 2 – 4 of the OSI model.

These classes attempt to cover different aspects of the wide-ranging duties concerning system administration. Attendees can hope to gain practical insight into the real-world duties: of installation, configuration, maintenance and securing of mission critical devices and services.

The world of the virtual OS has become a fact of life in the modern infrastructure. However, this new field brings with it new attack vectors that need to be recognized and guarded against. These classes will give you the tool-set to better plan the deployment in order to optimize security.